MIMO異構(gòu)網(wǎng)絡(luò)中一種基于人工噪聲的抗主動(dòng)竊聽(tīng)者的魯棒安全傳輸方案
doi: 10.11999/5EIT190649
-
1.
戰(zhàn)略支援部隊(duì)信息工程大學(xué) 鄭州 450001
-
2.
陸軍工程大學(xué)通信士官學(xué)?!≈貞c 400035
基金項(xiàng)目: 國(guó)家自然科學(xué)基金(61871404, 61701538)
A Robust Secure Transmission Scheme Based onArtificial Noise for Resisting Active Eavesdropper in MIMO Heterogeneous Networks
-
1.
Information Engineering University, Zhengzhou 450001, China
-
2.
Communication Sergeant School, Army Engineering University, Chongqing 400035, China
Funds: The National Natural Science Foundation of China (61871404, 61701538)
-
摘要: 為保證MIMO異構(gòu)網(wǎng)絡(luò)面臨多天線主動(dòng)竊聽(tīng)時(shí)的安全性,該文提出一種基于人工噪聲的抗主動(dòng)竊聽(tīng)者的魯棒安全傳輸方案。首先,考慮竊聽(tīng)者發(fā)送上行導(dǎo)頻干擾的情形,研究了其發(fā)送的上行導(dǎo)頻干擾對(duì)合法用戶信道估計(jì)的影響。隨后,基于信道估計(jì)結(jié)果對(duì)宏基站、微基站的下行數(shù)據(jù)與噪聲信號(hào)的預(yù)編碼矩陣進(jìn)行設(shè)計(jì),并推導(dǎo)了此種情形下系統(tǒng)安全速率的表達(dá)式。然后,以系統(tǒng)安全速率最大化為目標(biāo)對(duì)基站的下行數(shù)據(jù)與噪聲信號(hào)的發(fā)送功率進(jìn)行優(yōu)化設(shè)計(jì),并提出一種基于1維線性搜索的求解方法。進(jìn)一步地,考慮竊聽(tīng)者在發(fā)送上行導(dǎo)頻干擾后,繼而發(fā)送噪聲干擾用戶下行通信的情形,提出一種基于離散零和博弈方法來(lái)獲取最優(yōu)的發(fā)送功率設(shè)計(jì)。仿真結(jié)果驗(yàn)證了所提方案的安全性和魯棒性。
-
關(guān)鍵詞:
- 異構(gòu)網(wǎng)絡(luò) /
- 多輸入多輸出 /
- 物理層安全 /
- 主動(dòng)竊聽(tīng)
Abstract: To ensure the security of MIMO heterogeneous networks while facing the active multi-antenna eavesdropping, a robust secure transmission scheme based on artificial noise is proposed. Firstly, considering that the eavesdropper sends uplink pilot interference signal, the influence of uplink pilot interference on the channel estimation of legitimate users is studied. Then, based on the channel estimation results, the precoding matrix of downlink data and noise signals of macro base station and micro base station are designed, respectively. The expression of system security rate in this case is derived; After that, for maximizing the system security rate, the transmission power of downlink data and noise signal of base station are optimized, and a solution method based on one-dimensional linear search is proposed. Furthermore, considering the situation that the eavesdropper sends the uplink pilot interference and then sends the noise to interfere with the downlink communication of the legitimate user, a discrete zero-sum game method is proposed to obtain the optimal transmission power design. The simulation results verify the security and robustness of the proposed scheme. -
TANG Weijun, FENG Suili, DING Yuehua, et al. Physical layer security in heterogeneous networks with jammer selection and full-duplex users[J]. IEEE Transactions on Wireless Communications, 2017, 16(12): 7982–7995. doi: 10.1109/TWC.2017.2755640 彭建華, 張帥, 許曉明, 等. 物聯(lián)網(wǎng)中一種抗大規(guī)模天線陣列竊聽(tīng)者的噪聲注入方案[J]. 電子與信息學(xué)報(bào), 2019, 41(1): 67–73. doi: 10.11999/JEIT180342PENG Jianhua, ZHANG Shuai, XU Xiaoming, et al. A noise injection scheme resistant to massive MIMO eavesdropper in IoT[J]. Journal of Electronics &Information Technology, 2019, 41(1): 67–73. doi: 10.11999/JEIT180342 洪濤, 張更新. 人工噪聲輔助的物理層安全信號(hào)峰均功率比減低算法[J]. 電子與信息學(xué)報(bào), 2018, 40(6): 1426–1432. doi: 10.11999/JEIT170739HONG Tao and ZHANG Gengxin. Peak-to-average power ratio reduction algorithm of artificial-noise-aided secure signal[J]. Journal of Electronics &Information Technology, 2018, 40(6): 1426–1432. doi: 10.11999/JEIT170739 WANG Huiming, ZHENG Tongxing, YUAN Jinhong, et al. Physical layer security in heterogeneous cellular networks[J]. IEEE Transactions on Communications, 2016, 64(3): 1204–1219. doi: 10.1109/TCOMM.2016.2519402 XU Min, TAO Xiaofeng, FAN Yang, et al. Enhancing secured coverage with CoMP transmission in heterogeneous cellular networks[J]. IEEE Communications Letters, 2016, 20(11): 2272–2275. doi: 10.1109/LCOMM.2016.2598536 NGUYEN N P, KUNDU C, NGO H Q, et al. Secure full-duplex small-cell networks in a spectrum sharing environment[J]. IEEE Access, 2016, 4: 3087–3099. doi: 10.1109/ACCESS.2016.2582486 DI RENZO M and GUAN Peng. Stochastic geometry modeling and system-level analysis of uplink heterogeneous cellular networks with multi-antenna base stations[J]. IEEE Transactions on Communications, 2016, 64(6): 2453–2476. doi: 10.1109/TCOMM.2016.2552163 REN Yuan, Lü Tiejun, GAO Hui, et al. Secure wireless information and power transfer in heterogeneous networks[J]. IEEE Access, 2017, 5: 4967–4979. doi: 10.1109/ACCESS.2017.2682277 LI Bin, FEI Zesong, CHU Zheng, et al. Secure transmission for heterogeneous cellular networks with wireless information and power transfer[J]. IEEE Systems Journal, 2018, 12(4): 3755–3766. doi: 10.1109/JSYST.2017.2713881 HU Xin, LI Bin, HUANG Kaizhi, et al. Secrecy energy efficiency in wireless powered heterogeneous networks: A distributed ADMM approach[J]. IEEE Access, 2018, 6: 20609–20624. doi: 10.1109/ACCESS.2018.2825387 HU Die, ZHANG Wei, HE Lianghua, et al. Secure transmission in multi-cell multi-user massive MIMO systems with an active eavesdropper[J]. IEEE Wireless Communications Letters, 2019, 8(1): 85–88. doi: 10.1109/LWC.2018.2859329 ALAGELI M, IKHLEF A, and CHAMBERS J. SWIPT massive MIMO systems with active eavesdropping[J]. IEEE Journal on Selected Areas in Communications, 2019, 37(1): 233–247. doi: 10.1109/JSAC.2018.2872370 BASAR T and OLSDER G J. Dynamic Noncooperative Game Theory[M]. 2nd ed. New York: Academic Press, 1995: 23–28. -